Description
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33743 | In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size. |
Ubuntu USN |
USN-5487-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-5487-3 | Apache HTTP Server regression |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T06:17:55.325Z
Reserved: 2022-04-16T00:00:00.000Z
Link: CVE-2022-29404
No data.
Status : Modified
Published: 2022-06-09T17:15:09.283
Modified: 2024-11-21T06:59:01.000
Link: CVE-2022-29404
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN